{"api_version":"1","generated_at":"2026-04-22T20:52:42+00:00","cve":"CVE-2024-23234","urls":{"html":"https://cve.report/CVE-2024-23234","api":"https://cve.report/api/cve/CVE-2024-23234.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-23234","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-23234"},"summary":{"title":"CVE-2024-23234","description":"An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.7.4, macOS Sonoma 14.4, macOS Ventura 13.6.5. An app may be able to execute arbitrary code with kernel privileges.","state":"PUBLISHED","assigner":"apple","published_at":"2024-03-08 02:15:47","updated_at":"2026-04-02 19:17:02"},"problem_types":["CWE-787","An app may be able to execute arbitrary code with kernel privileges","CWE-787 CWE-787 Out-of-bounds Write"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"6.7","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"ADP","type":"DECLARED","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}],"references":[{"url":"https://support.apple.com/en-us/120895","name":"https://support.apple.com/en-us/120895","refsource":"product-security@apple.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/kb/HT214085","name":"https://support.apple.com/kb/HT214085","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/HT214085","name":"https://support.apple.com/en-us/HT214085","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2024/Mar/21","name":"http://seclists.org/fulldisclosure/2024/Mar/21","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/HT214084","name":"https://support.apple.com/en-us/HT214084","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/kb/HT214083","name":"https://support.apple.com/kb/HT214083","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/HT214083","name":"https://support.apple.com/en-us/HT214083","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/120884","name":"https://support.apple.com/en-us/120884","refsource":"product-security@apple.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2024/Mar/22","name":"http://seclists.org/fulldisclosure/2024/Mar/22","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/en-us/120886","name":"https://support.apple.com/en-us/120886","refsource":"product-security@apple.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2024/Mar/23","name":"http://seclists.org/fulldisclosure/2024/Mar/23","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.apple.com/kb/HT214084","name":"https://support.apple.com/kb/HT214084","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-23234","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23234","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Apple","product":"macOS","version":"affected 12.7.4 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"macOS","version":"affected 13.6.5 custom","platforms":[]},{"source":"CNA","vendor":"Apple","product":"macOS","version":"affected 14.4 custom","platforms":[]},{"source":"ADP","vendor":"apple","product":"macos","version":"affected 12.7.4 custom","platforms":[]},{"source":"ADP","vendor":"apple","product":"macos","version":"affected 13.0 13.6.5 custom","platforms":[]},{"source":"ADP","vendor":"apple","product":"macos","version":"affected 14.0 14.4 custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2024","cve_id":"23234","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2024-23234","qid":"379476","title":"Apple macOS Ventura 13.6.5 Not Installed (HT214085)"},{"cve":"CVE-2024-23234","qid":"379477","title":"Apple macOS Monterey 12.7.4 Not Installed (HT214083)"},{"cve":"CVE-2024-23234","qid":"379478","title":"Apple macOS Sonoma 14.4 Not Installed (HT214084)"}]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2025-11-04T18:25:04.929Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_transferred"],"url":"https://support.apple.com/en-us/HT214083"},{"tags":["x_transferred"],"url":"https://support.apple.com/en-us/HT214085"},{"tags":["x_transferred"],"url":"https://support.apple.com/en-us/HT214084"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/Mar/21"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/Mar/22"},{"tags":["x_transferred"],"url":"http://seclists.org/fulldisclosure/2024/Mar/23"},{"url":"https://support.apple.com/kb/HT214085"},{"url":"https://support.apple.com/kb/HT214084"},{"url":"https://support.apple.com/kb/HT214083"}],"title":"CVE Program Container"},{"affected":[{"cpes":["cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","product":"macos","vendor":"apple","versions":[{"lessThan":"12.7.4","status":"affected","version":"0","versionType":"custom"},{"lessThan":"13.6.5","status":"affected","version":"13.0","versionType":"custom"},{"lessThan":"14.4","status":"affected","version":"14.0","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2024-23234","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2024-03-30T04:01:01.866476Z","version":"2.0.3"},"type":"ssvc"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2024-08-27T16:10:01.066Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"macOS","vendor":"Apple","versions":[{"lessThan":"12.7.4","status":"affected","version":"0","versionType":"custom"},{"lessThan":"13.6.5","status":"affected","version":"0","versionType":"custom"},{"lessThan":"14.4","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.7.4, macOS Sonoma 14.4, macOS Ventura 13.6.5. An app may be able to execute arbitrary code with kernel privileges."}],"problemTypes":[{"descriptions":[{"description":"An app may be able to execute arbitrary code with kernel privileges","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2026-04-02T18:26:42.215Z","orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple"},"references":[{"url":"https://support.apple.com/en-us/120884"},{"url":"https://support.apple.com/en-us/120886"},{"url":"https://support.apple.com/en-us/120895"}]}},"cveMetadata":{"assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","cveId":"CVE-2024-23234","datePublished":"2024-03-08T01:36:20.258Z","dateReserved":"2024-01-12T22:22:21.480Z","dateUpdated":"2026-04-02T18:26:42.215Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2024-03-08 02:15:47","lastModifiedDate":"2026-04-02 19:17:02","problem_types":["CWE-787","An app may be able to execute arbitrary code with kernel privileges","CWE-787 CWE-787 Out-of-bounds Write"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0","versionEndExcluding":"12.7.4","matchCriteriaId":"A61173BD-535F-46FC-B40F-DA78B168E420"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0","versionEndExcluding":"13.6.5","matchCriteriaId":"69C4F06A-061F-46B3-8BB7-5C9B47C00956"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0","versionEndExcluding":"14.4","matchCriteriaId":"73160D1F-755B-46D2-969F-DF8E43BB1099"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2024","CveId":"23234","Ordinal":"1","Title":"CVE-2024-23234","CVE":"CVE-2024-23234","Year":"2024"},"notes":[{"CveYear":"2024","CveId":"23234","Ordinal":"1","NoteData":"An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.7.4, macOS Sonoma 14.4, macOS Ventura 13.6.5. An app may be able to execute arbitrary code with kernel privileges.","Type":"Description","Title":"CVE-2024-23234"}]}}}